GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

The State of DDoS Weapons

  • Author(s):
  • A10 Networks

DDoS attacks continue to grow in frequency, intensity, and sophistication. However, the delivery method of using infected botnets and vulnerable servers to perform crushing attacks on a massive scale has not changed. Unlike other cyber attacks, where attackers leverage obfuscation to prevent detection, the loud distributed nature of DDoS attacks creates opportunities for defenders to take a proactive approach by focusing on the weapon’s location.

Attackers leverage vulnerabilities in the UDP protocol to spoof the target’s IP address and exploit vulnerabilities in servers that initiate a reflected response. This strategy amplifies the attack by producing server responses that are much larger than the initial requests.

  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:A10 Networks
Published:July 1, 2020
License:Copyrighted
Copyright:© 2020 A10 Networks, Inc. All rights reserved.

Featured Content

Contact Publisher

Claim Content